Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data TransformationYuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao
    USENIX Security '23Controlled Data Races in Enclaves: Attacks and DetectionSanchuan Chen, Zhiqiang Lin, Yinqian Zhang
    USENIX Security '23BalanceProofs: Maintainable Vector Commitments with Fast AggregationWeijie Wang, Annie Ulichney, Charalampos Papamanthou
    USENIX Security '23autofz: Automated Fuzzer Composition at RuntimeYu-Fu Fu, Jaehyuk Lee, Taesoo Kim
    USENIX Security '23Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key ManagementVivek Nair, Dawn Song
    USENIX Security '23PROGRAPHER: An Anomaly Detection System based on Provenance Graph EmbeddingFan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang
    USENIX Security '23Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic AugmentationRenjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang
    USENIX Security '23Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural NetworksJialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang
    USENIX Security '23Design of Access Control Mechanisms in Systems-on-Chip with Formal Integrity GuaranteesDino Mehmedagić, Mohammad Rahmani Fadiheh, Johannes Müller, Anna Lena Duque Antón, Dominik Stoffel, Wolfgang Kunz
    USENIX Security '23ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence GraphsPrashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos
    USENIX Security '23VeriZexe: Decentralized Private Computation with Universal SetupAlex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho
    USENIX Security '23MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS BinariesXingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang
    USENIX Security '23Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach AttorneysDaniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz
    USENIX Security '23NRDelegationAttack: Complexity DDoS attack on DNS Recursive ResolversYehuda Afek, Anat Bremler-Barr, Shani Stajnrod
    USENIX Security '23Jinn: Hijacking Safe Programs with TrojansKomail Dharsee, John Criswell
    USENIX Security '23Hiding in Plain Sight: An Empirical Study of Web Application Abuse in MalwareMingxuan Yao, Jonathan Fuller, Ranjita Pai Kasturi, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio
    USENIX Security '23CSHER: A System for Compact Storage with HE-RetrievalAdi Akavia, Neta Oren, Boaz Sapir, Margarita Vald
    USENIX Security '23The Case for Learned Provenance Graph Storage SystemsHailun Ding, Juan Zhai, Dong Deng, Shiqing Ma
    USENIX Security '23Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous VehiclesZekun Cai, Aiping Xiong
    USENIX Security '23Long Live The Honey Badger: Robust Asynchronous DPSS and its ApplicationsThomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller
    USENIX Security '23Automated Cookie Notice Analysis and EnforcementRishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz
    USENIX Security '23Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy LabelsYue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing
    USENIX Security '23High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable EncryptionXianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang
    USENIX Security '23Improving Real-world Password Guessing Attacks via Bi-directional TransformersMing Xu, Jitao Yu, Xinyi Zhang, Chuanwang Wang, Shenghao Zhang, Haoqi Wu, Weili Han
    USENIX Security '23KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting MitigationsTingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao Zhang

Pages